Lucene search

K
githubGitHub Advisory DatabaseGHSA-C942-MFMP-P4FH
HistoryOct 19, 2022 - 7:00 p.m.

Markdownify subject to Remote Code Execution via malicious markdown file

2022-10-1919:00:17
GitHub Advisory Database
github.com
7
markdownify
remote code execution
arbitrary code
nodeintegration

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

33.3%

Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the “nodeIntegration” option enabled. There are currently no patched versions and no known workarounds.

Affected configurations

Vulners
Node
markdownify_projectmarkdownifyRange1.4.1
VendorProductVersionCPE
markdownify_projectmarkdownify*cpe:2.3:a:markdownify_project:markdownify:*:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

33.3%

Related for GHSA-C942-MFMP-P4FH